National Cybersecurity Awareness Month

Security Innovation is proud to be a National Cybersecurity Awareness Month Champion, dedicated to helping make companies more secure from administrators and developers to IT Security Managers and CISOs.

WEEK 1: Simple Steps to Online Safety

Stay Safe on Social Media  

Social media scams skyrocketed by 150% across Facebook, Twitter, Instagram, and LinkedIn in 2016 - and that number just keeps growing. Download our Social Media Checklist for some helpful hints to keep your personal information safe and secure.

Text-Img.jpg
FeatureIcon1.png

Get Secure at Work and Home

It takes only one look at the current headlines to understand why organizations and consumers alike are so concerned with cybersecurity. There is an endless stream of reports on state-sponsored hacking, denial of service attacks, ransomware, and leaks by malicious insiders.  But what can we do to better protect our data at work and at home?
 
There are the basic measures, that most everyone is aware of, like firewalls and antivirus software, but there are many more effective things we all can do to help combat attacks.
 
Continue reading to learn some of our top tips on keeping you safe at work and at home.
FourFullBleed1.jpg
FourFullBleed2.jpg
FourFullBleed3.jpg
FourFullBleed4.jpg

How to Stay Safe Online…An Engineer’s Perspective

This quick tips video from our Security Engineer, Max Chauhan, talks about using different passwords and how using the same password across multiple account could be dangerous if the account is compromised!

WEEK 2: Cybersecurity in the Workplace is Everyone's Problem  

How to Build a Culture of Cybersecurity

A strong culture of cybersecurity can complement and work with procedural and technology controls to help organizations be proactive as they build secure software, systems, and networks – as well as help detect and stop potential attacks.
 
To learn how to improving the security culture at your organization, fill out the form to download our newest white paper: Ten Core Activities for Building a Culture of Cybersecurity

Get The Whitepaper

blog

Five Steps to Make Compliance a Breeze

Many organizations are required to regularly educate employees about security responsibilities and best practices to meet compliance requirements, including PCI-DSS, HIPAA, OWASP, NIST and more. With well rounded security awareness and application security training programs, your teams will better understand their roles and responsibilities around maintaining compliance for your company.
 
Learn more about compliance standards for security training and how Security Innovation’s courses cover compliance mandates.

How to Stay Safe Online...an Engineer's Perspective

This quick tips video from our VP of Services, Joe Basirico, talks about checking website URLs and make sure they are secure by using SSL and TLS (cryptographic protocols that ensure browser safety).


WEEK 3: Today's Predictions for Tomorrow's Internet

What is the IoT?

Everything you need to know about the Internet of Things (IoT)... in just 2 Minutes!

FeatureIcon1.png

Are We Doomed to Repeat the Security Mistakes of the Past?

Despite there being a defensive coding best practice that mitigates the risk of a buffer overflow occurring in any of these architectures, developers are STILL writing code that allows untrustworthy input to compromise application memory.  How do we stop this cycle or are we doomed to repeat the security mistakes of the past?

Read our latest blog post to get our expert's take.

Backing Up Safely

Everyone loses data at some point in their lives. Your computer’s hard drive could fail tomorrow, ransomware could hold your files hostage, or a software bug could delete your important files. If you’re not regularly backing up your computer, you could lose those files forever.

Using our handy infographic, learn the best way to back up your Mac or PC safely.

Backing Up Safely

How to Stay Safe Online...an Engineer's Perspective


Director of Research, Marcus Hodges, warns users to be skeptical when browsing online.

WEEK 4: The Internet Wants YOU: Consider a Career in Cybersecurity

Mac & PC Computer Safety

With the prevalence of malware and other viruses, achieving good computer security can seem like a daunting task. Fortunately, following the few simple steps outlined in our handy checklist can help keep your computer's security tight.

 

 

Cybersecurity’s Largest Untapped Resource - Women!

Despite the estimated number of unfilled cybersecurity positions worldwide - over 1 million by some counts - women represent a mere 11% of the industry. That means that we missing out on almost half of the population’s talent pool, during a period in history when cyber crime poses one of the most menacing threats to our society.

Security Innovation is committed to helping bridge the gender gap in the industry, supporting groups like WISP and others. But most importantly, we support women in cybersecurity in our offices! Hear from a few of our female engineers as to why they got into the field, what challenges they face and how they think we can attract more women to cybersecurity.

Text-Img.jpg

How to Stay Safe Online… An Engineer's Perspective

This quick tips video comes from one of our security engineers, Andrew McKenna, who talks about secure password best practices online.

 

WEEK 5: Protecting Critical Infrastructure from Cyber Threats

Kiosk Computer Threats

In today’s busy, automated world people are finding themselves using touchscreen kiosks everywhere - from restaurants to the airport.  But don’t be fooled, these machines are just big computers, with the ability to become compromised.  Check out our top safety tips when using kiosks in this easy-to-follow infographic.

[Webinar] Infrastructure Technology Solutions to Protect Enterprise Applications

Applications are the primary target of attack due to their prevalence and inherent exposure, and require a solid defense in depth strategy to reduce risk. This webinar will educate IT and development teams on technologies available to build and deploy more secure software systems and debunks common myths about what each can and cannot protect.

Register Now

Text-Img.jpg